General

  • Target

    7aa03ed6935a820850ae6a10b4e8715123c0cf79412925a56b7c55a04b4929a6.zip

  • Size

    286KB

  • Sample

    221114-lqh3xage39

  • MD5

    70a60767f65acc228b70cc2be9f7ddb3

  • SHA1

    44350f9cfa05187e961f7aa312f30c865d655c42

  • SHA256

    dad01223a0c3d60bb7707b2e35702194a352a0c18492a17ba413390922082a8f

  • SHA512

    fc51285e29e40923c027046c61414ef6feeb3b7a4c2b076a130f274f8996aaf5c4d788d2632dd6ce1cb38d0b0c51d8107901424080014df28742969f8d92a5ad

  • SSDEEP

    6144:7iGMQYrhAUxVpdA/bZFrI8SQ58R5Xabr3ZghDX2Dtg3dwD4IJ:+J1tgNFs8IR5XGIDXEGwD7

Malware Config

Extracted

Family

fickerstealer

C2

asfasfvcxvdbs.com:80

Targets

    • Target

      7aa03ed6935a820850ae6a10b4e8715123c0cf79412925a56b7c55a04b4929a6.exe

    • Size

      503KB

    • MD5

      27041b8e37dc80cc783f807c639c2e0e

    • SHA1

      c4a0ff2bfa649764291378b2a4a46903145b90c5

    • SHA256

      7aa03ed6935a820850ae6a10b4e8715123c0cf79412925a56b7c55a04b4929a6

    • SHA512

      5ee30068efb17ea98f2dcd8ba25caa30a44d938de44ab72b909fa4b34800d45f9b18dc36bea8f92ea9ec2df07bae61bcb31b357b13dbef1a83fbb6393e032515

    • SSDEEP

      12288:plHHjTbTHrU9RZ8V0lQhJdFPwvLmGe0EXaW0rN3:TH/vHga06hJdpcCGhU63

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks